With a support entitlement you can also get direct access to our team of highly-qualified Arm experts 24-hours a day
Open a support case
Due to security concerns, we need to close some part of our implementation so we have different uVision library projects includes concerned implementation. But when we look into MDK (ARMCC) library output file we are seeing even our private symbols (e.g. private/static function names).
So, from the reverse engineering side, can symbol names be used to understand how it works? Or can we reduce information in a library output using compiler/linker flags?